Soc-Is-Mandatory [Defcamp Quals 2023]
Challenge Description
You are part of a cybersecurity team working in a state-of-the-art Security Operations Center (SOC). Your SOC has been tasked with monitoring a critical infrastructure network that includes various servers, databases, and communication channels. As a SOC analyst, it’s your duty to keep this infrastructure secure and ensure that it remains operational.
Early this morning, your team received alerts from the intrusion detection system (IDS) indicating suspicious network activities. The alerts suggest a potential security incident. Your SOC has just received an official request to investigate this incident.
Objective
Your mission is to identify, analyze, and provide information about the threats inside the affected network.
Notes
- the logs dashboard (index-pattern) is soc-is-mandatory
- the logs are from 4 years ago, therefore a timeframe should be set accordignally.
The challenge is divided into 4 questions.
Provided Files
The challenge provides a link to a Kibana dashboard.
Question 1
Provide the IP of the infected host.
Intuition
For all the questions, we need to set the index
to soc-is-mandatory*
, put the date filter as Last 4 years rounded to the year
and use the Discover
tab.
To find the IP of the infected host, we can use the source_ip
field and see how many records are there for each IP.
The private IP with the most records is the one we are looking for.
Solution
Use the source_ip
field and see how many records are there for each IP. The private IP with the most records is the
one we are looking for.
Flag
10.0.0.168
Question 2
Provide the name of the malware used to infect the host.
Intuition
Let’s look for some suspicious activity. For our IP by adding the payload_data
field and start scrolling down.
Solution
The payload_data
field contains the payload of the request. We can see that there is a request that contains a
suspicious
url ckav.ru
and the following data Admin GSNTPAWQ GSNTPAWQ
. If we google this url we can find the malware name.
Flag
loki
Question 3
Provide the malicious URL path which was the start point of the infection.
Intuition
I have to search for an HTTP request that looks suspicious after the date of the request I found in question 2.
Solution
The request is the second log above the request from question 2. The request is a POST method with
the Mozilla/4.08 (Charon; Inferno)
user-agent
as described in the following doc of the loki
malware.
Flag
/~element/page.php?id=484
Question 4
Provide the time when the first malicious request was sent.
Intuition
I have to copy the timestamp
field of the malicious request from question 3.
Solution
This one is very easy but tricky because the correct answer is not the timestamp of the first request but the time ( hour, minute, second and millisecond) of the first request.
Flag
20:36:44.000